MARC details
000 -LEADER |
fixed length control field |
01724cam a22003737i 4500 |
001 - CONTROL NUMBER |
control field |
19077532 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240620020013.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
160429s2016 inua 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
|
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780137984787 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
078975746X |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn952669658 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
SISPL |
Language of cataloging |
eng |
Transcribing agency |
SISPL |
Description conventions |
rda |
Modifying agency |
OCLCF |
-- |
YDX |
-- |
LTSCA |
-- |
HF9 |
-- |
LND |
-- |
I8M |
-- |
OCLCA |
-- |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
E27 2023 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Easttom, Chuck, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Computer security fundamentals / |
Statement of responsibility, etc |
Chuck Easttom. |
250 ## - EDITION STATEMENT |
Edition statement |
5th ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Harlow, Essex: |
Name of publisher, distributor, etc |
Pearson, |
Date of publication, distribution, etc |
c2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxix, 548 p. : |
Other physical details |
illustrations ; |
Dimensions |
25 cm |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction to Computer Security -- Networks and the Internet -- Cyber Stalking, Fraud and Abuse -- Denial of Service Attacks -- Malware -- Techniques used by Hackers -- Industrial Espionage in Cyberspace -- Encryption -- Computer Security Software -- Security Policies -- Network Scanning and Vulnerability Scanning -- Cyber Terrorism and Information Warfare -- Cyber Detective -- Introduction to Forensics |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
9 (RLIN) |
1473 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
1698 |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Seguridad informática. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Redes de computadoras |
General subdivision |
Medidas de seguridad. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
fast |
9 (RLIN) |
1698 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
Source of heading or term |
fast |
9 (RLIN) |
1473 |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://catalogue.londonmet.ac.uk/record=b1789897~S1">http://catalogue.londonmet.ac.uk/record=b1789897~S1</a> |
Public note |
E-book |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Item type |
Books |
Classification part |
QA76.9.A25 |
Call number prefix |
QA76.9.A25 |
Call number suffix |
.E27 2023 |
Koha issues (borrowed), all copies |
1 |